Learn More
The intrusion detection system architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, artificial neural networks and fuzzy inference system, are used to design an intrusion detection system. SNORT is used to perform(More)
In this paper, we present a novel encryption-less algorithm to enhance security in transmission of data packets across mobile ad hoc networks. The paper hinges on the paradigm of multipath routing and exploits the properties of polynomials. The first step in the algorithm is to transform the data such that it is impossible to obtain any information without(More)
In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type.(More)
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or(More)
The analogy between immune systems and intrusion detection systems encourage the use of artificial immune systems for anomaly detection in computer networks. This paper describes a technique of applying artificial immune system along with genetic algorithm to develop an intrusion detection system. Far from developing primary immune response, as most of the(More)
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and(More)
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication(More)
— A Mobile Adhoc Network (MANET) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination among nodes in a cooperative MANET has induced in them a vulnerability to attacks due to issues like dynamically changing network topology, cooperative algorithms and lack of centralized(More)
In Ad hoc On Demand Vector (AODV) routing protocol for Mobile Ad hoc Networks (MANET), malicious nodes can easily disrupt the communication. A malicious node that is not part of any route may launch Denial of Service (DoS) Attack. Also once a route is formed, any node in the route may turn malicious and may refrain from forwarding packets, modify them(More)